DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
f1f0aedc4793cbdd4f30b687a242d0160c82f1d62083c6f07c3ed5ea21c5e323.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1f0aedc4793cbdd4f30b687a242d0160c82f1d62083c6f07c3ed5ea21c5e323.dll
Resource
win10v2004-20220812-en
Target
f1f0aedc4793cbdd4f30b687a242d0160c82f1d62083c6f07c3ed5ea21c5e323
Size
88KB
MD5
64cf2deba92a05cb3d70710ea307cdc0
SHA1
350f227b13bba05c96d2cf0d52eefd5237aa7e1f
SHA256
f1f0aedc4793cbdd4f30b687a242d0160c82f1d62083c6f07c3ed5ea21c5e323
SHA512
4080a7e23dc4141e6ea23d73e8194aace5176f00c16a9f7be4e032909bf2e1bea3b4db3dd92013f7dd03be799173099b0dc377a60427b77d32bb0ab428a60d2e
SSDEEP
1536:FL7+rfix7kI37Icx3A/W5WD8CYOLCGbjuZ4DtGvK1V2BueYd1Qb3230NMo2KMx/P:tKWxY80G3YsOLNCZ4YNue81mG3yqRP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE